[1]陳俊廷(2008),虛擬化網路安全實習實驗室之規劃與建置。淡江大學資訊管理所碩士論文。[2]Hagen, W. (2008), Professional XEN Virtualization. WroxPressLtd.
[3]Bittman, T. (2003), Predicts2004: Server virtualization Evolves Rapidly, Gartner Research Note.
[4]Hu, J., Cordel D., Meinel, Christoph, (2004), A Virtual Laboratory for IT Security Education, Proc. EMISA Luxemborug. 60-71.
[5]Singh,Amit,2004,“AnIntroductiontoVirtaualization”.Fromhttp://www.kernelthread.com/publications/virtualization.
[6]NetgearTechnicalBulletin,Fromftp://ftp.winco.com.hk/product/Netgear/VPN%20Router/FVX538/Manual/Netgear_FVX538_DMZ_configuration_guide.pdf
[7]Virtualization. From Wikipedia
http://en.wikipedia.org/wiki/Virtualization
[8]Xen. From Wilipedia
http://zh.wikipedia.org/wiki/Xen
[9]機房革命虛擬化起飛. From
http://www.ithome.com.tw/itadm/article.php?c=41169
[10]Face-off: Virtualization Takes Center Stage, From
http://vmblog.com/archive/2007/12/31/face-off-virtualization-takes-center-stage.aspx
[11]國立台灣大學計算機及資訊網路中心. From
http://www.cc.ntu.edu.tw/chinese/epaper/0004/20080320_4012.htm
[12]ZDNET. From
http://www.zdnet.com.tw/enterprise/technology/0,2000085680,20108135,00.htm
[13]OpenVZ User’s Guide. From
http://download.openvz.org/doc/OpenVZ-Users-Guide.pdf